Browse Products & Solutions
Cybersecurity risk management extends the basic concepts of traditional risk management to cyber threats in particular. It requires identifying your risks and vulnerabilities and developing solutions to ensure your organization is protected.
IT security teams need a comprehensive risk management strategy to protect their business against the negative impacts of cybersecurity attacks.
A-LIGN
Cybersecurity Compliance, SOC 2 Readiness Assessment, ISO 27001 Readiness AssessmentA-LIGN offers comprehensive expertise and consulting for every set of compliance objectives and makes your specific path our priority.
Assure Professional
SOC 1, SOC 2 and ISO 27001 AuditorAssure Professional specializes in providing cybersecurity, assurance, and compliance solutions. With a unique service, they provide due diligence, private equity, accounting services, and compliance connection programs for SOC 1 (formerly SSAE 16) Audits, Soc 2 + HITRUST Audits, SOC SOC Readiness Assessments, SOC for Cybersecurity, SOC for Vendor Supply Chain, ISO 27001 Assessments and HIPAA/HITECH Assessments.
BitSight
Cyber Security Ratings Platform & Third Party Risk Management - TPRMBitSight enhances the tactics and methods that organizations understand and manage security risk. BitSight is utilized by Fortune 500, top investment banks, cyber insurers and over 1,000 customers.
Capital Security and Risk Group
Penetration Testing - PenTest ServicesThrough mimicking hacking techniques, our experts continuously examine Tactics, Techniques, and Procedures (TTPs) to strengthen security infrastructures. The Incident Response assessment process ensures accurate tactics on resolving incidents.
Critical Start
Managed Detection and Response - MDR and Managed Security ServicesCRITICALSTART is leading the way in Managed Detection and Response (MDR) services.
CrowdStrike
Endpoint Detection and Response - EDR, Extended Detection and Response - XDR, Managed Detection and Response - MDR, Next Generation Anti-Virus - NGAVCrowdStrike is a US-based company that provides cloud workload, endpoint security, threat intelligence, and cyberattack response serrvices.
CyberGRX
Cyber Security Ratings Platform & Third Party Risk Management - TPRMA supplier of a competitive third-party cyber risk management platform that identifies, evaluates, and monitors enterprise-level cyber security, CyberGRX sets the standard on automation and analytics to provide valuable solutions preventing security threats.
Dean Dorton
Cyber Security Audit, Assessment and Compliance ServicesDean Dorton assists clients through strategic business levels within audit, tax, business management, consulting and technology solutions utilizing innovative cloud solutions.
Devo
Security Information and Event Management - SIEM, Security Orchestration, Automation, and Response -SOAR, and User and Entity Behavior Analytics - UEBA SolutionsFireEye
XDR - Extended Detection and Response, Endpoint Security and Cloud Security SolutionsFireEye provides futuristic security and expertise in cyberattacks.
Fortinet
Next Generation Firewall - NGFW, Network Firewall, Secure Access Service Edge - SASE, Network Detection & Response - NDR, Security Information & Event Management - SIEM, Security Orchestration, Automation & Response - SOARFortinet secures all types of business worldwide, from SMB to enterprises and government organizations, providing network security solutions. Next Generation Firewall - NGFW, Network Firewall, Secure Access Service Edge - SASE, Network Detection & Response - NDR, Security Information & Event Management - SIEM, Security Orchestration, Automation & Response - SOAR
Okta
Identity and Access Management (IAM) SoftwareOkta provides security connections within user authentication, password access, directory integration, and cross-application analysis.
Orca Security
Cloud Security for Amazon Web Services, Microsoft Azure and Google Cloud PlatformGet Agentless, Workload-Deep, Context-Aware Security and Compliance for AWS, Azure, and GCP.
Detect
and prioritize cloud security risk – in minutes, not months.
Rapid7
Managed Detection and Response (MDR)Rapid7 is trusted and depended on around the world to provide advanced technology, services, and in-depth research for complex vulnerabilities and cyberattacks affecting security teams.
Rebyc Security
The Best Cyber Security Defense is a Smart OffenseDelivering customized security solutions in for the financial industry, Rebyc Security is led by IT veterans that proactively identifies and prevents risks
RiskIQ
Security Intelligence for What MattersRiskIQ is the leader in attack surface management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence.
RiskSense
Full Spectrum Risk-Based Vulnerability ManagementRiskSense®, Inc. provides vulnerability prioritization and management to dynamically control and measure cybersecurity risk.
SecurityScorecard
Cyber Security Ratings Platform & Third Party Risk Management - TPRMSecurityScorecard was founded in 2013 by Dr. Alex Yampolskiy and Sam Kassoumeh. Through their patented rating technology, SecurityScorecard creates an instant risk analysis and is used by over one thousand companies to self-monitor, evaluate third party risk, andn cyber insurance underwriting.
Silent Breach
We've breached the Department of Defense. Twice.Silent Breach provides network security and digital asset protection services, allowing companies to continue their business without experiencing consumer fallout and financial loss due to IT vulnerabilities.
Synack
PenTest - Penetration Testing and Bug Bounty ServicesSynack is a security testing platform that delivers intelligent cyber attack evaluations continuously through AI-enabled processes.
Tenable
TRUSTED BY MORE THAN 30,000 ORGANIZATIONS WORLDWIDETenable, Inc., delivers vision and security to digital assets existing on any platform to thousands of organizations including government agencies Fortune 500 and Global 2000 groups.
TrustedSec
Penetration Test - PenTest Services, Breach and Attack Simulation - BASTrustedSec is an IT security consulting netowork with expertise in strategized risk-management that asissts companies in preventing and defending against cyber threats.
UpGuard
Cyber Security Ratings Platform & Third Party Risk Management - TPRMUpGuard delivers a well-rounded cyber risk solution by bringing together third-party security ratings, vendor questionaires, and cyber threat data.
Wiz
Cloud infrastructure security reimaginedWiz is a new approach to cloud security that finds the most critical risks and infiltration vectors with complete coverage across the full stack of multi-cloud environments.
BrandShield
Cyber Security Brand Protection, Website Takedowns, Trademark Infringement, Dark Web MonitoringBrandShield provides Cyber Security Brand Protection, Website Takedowns, Trademark Infringement, Dark Web Monitoring and prevents, detects and fights online scams: phishing attacks, fraud, executive impersonations and more.
Fortalice Solutions
We transform a reactive security model into a proactive, results-based model.Their highly-skilled practitioners are trained to meet clients where they are – whether that be in the midst of a crisis or proactively seeking cybersecurity services.
ZeroFOX
Threat Intelligence, Dark Web Monitoring, Open Source Intelligence (OSINT)ZeroFOX provides enterprises AI-powered protection, intelligence and disruption to identify and dismantle external threats across the public attack surface
Vanta
Automated security monitoring for compliance certifications: SOC 2, HIPAA, and ISO 27001
Tugboat Logic
Like the immortal tugboat, we're passionate about guiding you through the rough seas of information security and privacy into the calm waters of proven policies, practices and compliance.
Sumo Logic
Sumo Logic is the pioneer in continuous intelligence, a new category of software, which enables organizations of all sizes to address the data challenges and opportunities presented by digital transformation, modern applications, and cloud computing
Cyber Observer (now part of XM Cyber)
Continuous Controls Monitoring for end-to-end cybersecurity visibilityrunZero
runZero brings together the best of IT, security and networking technology to deliver amazing network discovery and asset inventory capabilities for modern enterprises. If your looking to cyber security asset discovery and management tools, look no further than runZero for your network discovery and asset inventory platform.
Binary Defense
Managed Detection and Response - MDRShield Your Business From Cyber Attacks With Binary Defense Managed Detection and Response - MDR Solutions
Sevco Security
The Power of 4D Asset IntelligenceSevco Security is designed to deliver the most accurate & comprehensive asset information possible for better, smarter, and faster decision making to improve posture and reduce risk.
Signal Corporation
Threat Intelligence, Dark Web Monitoring, and Open Source Intelligence (OSINT)Assess Threats, Risks and Vulnerabilities using Signal Corporation's OSINT Threat, Dark Web Monitoring and Risk Intelligence Platform. Signal Corporation provides access to online data, including the dark web, to give physical security, supply chain, crisis management, fraud, cyber security, and human resource teams early stage indicators of possible threats allowing them to take mitigate steps quickly. Monitor multiple data sources, advanced dark web search capability and real-time email and mobile notifications.
Horizon3
Continuously Verify Your Security PostureWe are a mix of US Special Operations, US National Security, and cybersecurity industry veterans. Our mission is to “turn the map around” – using the attacker’s perspective to help enterprises prioritize defensive efforts. Continuous PenTesting, Breach and Attack Simulation - BAS
Bishop Fox
Leading the Pack in Offensive SecurityWe've been in the offensive security space for almost two decades and are proud to be home to the innovators, engineers, and exploit writers behind some of the most popular security tools and research out there.
Trustifi
Email SecurityTrustif is a cloud based email security software and SaaS vendor. They help protect your email with AI-Powered security.
NetSPI
NetSPI Penetration Testing Services, Breach and Attack Simulation - BASNetSPI is a penetration testing company that is transforming the cyber security testing industry with tech-enabled services and prevention-based cyber security techniques. Global enterprises choose NetSPI’s penetration testing service to test their applications, networks, and cloud infrastructure at scale and manage their attack surfaces.
Echelon Risk + Cyber
We're built to address the needs of your full organization.Echelon was born from the idea that cybersecurity isn’t something that a professional services firm can just dabble in. Cybersecurity, privacy and technology risk present major threats that disrupt our way of life. That threat is constantly evolving, so we are too. We see it as our calling to stem the tide. We are all in. While other cybersecurity professional services firms tout what they do, few can articulate why they do it. We know exactly what drives us - protecting your basic right to security and privacy.
Our origin story begins with our name. The echelon formation creates a staggered but unified front, used to successfully provide excellent range of vision and protection to each participant. From our name, to how we conduct and manage ourselves on a day-to-day basis, we are built to be that trusted ally.
Cyberhaven
We reimagined data security for the cloud-first, hybrid work worldYour important data is always in motion, spreading to new people, applications, and devices that are outside traditional security controls. We protect data anywhere it goes in the extended enterprise. You can't protect what you can't see. We classify data by analyzing billions of events, not just patterns in the content, assembling a data lineage to identify and protect what other tools can’t
We protect important data other tools can’t see, from threats
they can’t detect, across technologies they can’t control.
Apollo Information Systems
Incident Response (IR) ServicesApollo Information Systems, Corp., operating in the USA and Canada, is a security leader for high-stakes organizations and businesses. With more than twenty years in cybersecurity and IT, Apollo has created a legacy of creating urgent and active resilience using the best tools, approaches, and solutions available across multiple industry verticals and government branches.
Apollo’s dynamic defense approach to cybersecurity changes the rules of engagement on traditional detect-and-respond practices, so organizations can be confident against a hostile environment of threats and uncertainty. Our approach simply aligns the protection of what matters the most to the organization to the most efficient allocation of protection per dollar. Apollo is led by some of the most respected professionals in the security industry who are steeped in real-world operational experience across multiple industry verticals and government branches.
Apollo's enormous suite of solutions and services offers complete cybersecurity defense from early warning and threat intelligence to professional advisory services and incident response.
Hunters
SIEM and SOAR SolutionsHunters is a group of cyber and technology experts with a mission to revolutionize security operations by combining data engineering, security expertise and layers of automation to expedite decision making,
helping security teams become attack-ready. Hunters infuses how attackers think and act into a platform that helps security operations see and stop attacks at their root.
DoControl
Discover, Understand, and Protect Your Data in SaaS Applications"DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation. We take a unique, customer-focused approach to the challenge of labor-intensive security risk management and data exfiltration prevention in popular SaaS applications. By replacing manual work with automation, DoControl reduces the overload of work and complexity that Security/IT teams have to deal with every day. What’s more, DoControl involves all employees as part of the security equation to drive business enablement and encourage a collaborative and frictionless security culture."
Valimail
DMARC Analyzing, Monitoring & Reporting PlatformValimail provides DMARC configuration and continuous monitoring helping to identify and authorize all senders, point out any bad actors, and make the first step towards enforcement providing a better, smarter way to accelerate your journey to DMARC enforcement.
Elastic
Observability and Security — built on ElasticsearchElastic NV is an American-Dutch company that was founded in 2012 in Amsterdam, the Netherlands, and was previously known as Elasticsearch. It is a search company that builds self-managed and software as a service offerings for search, logging, security, observability, and analytics use cases.
We’re the leading platform for search-powered solutions, and we help everyone — organizations, their employees, and their customers — find what they need faster, while keeping applications running smoothly, and protecting against cyber threats.When you tap into the power of Elastic Enterprise Search, Observability, and Security solutions, you’re in good company with brands like Uber, Slack, Microsoft, and thousands of others who rely on us to accelerate results that matter.
bugcrowd
The Bugcrowd Platform offers multiple solutions for finding and prioritizing the most critical risks in your attack surfaceBugcrowd has re-envisioned crowdsourced security with a platform-powered approach that activates the right researchers to your needs and environment at the right time, with all operational details fully managed for you.
Authomize
Detect & Mitigate Identity-based Risks and ThreatsAuthomize was founded by a group of seasoned and visionary entrepreneurs who identified the challenges IT and Security teams face in managing and securing authorizations in today’s complex environment. Authomize goal is to allow organizations to manage and secure today’s complex environment without compromising on productivity or security.
Authomize empowers organizations to enact identity-first security by detecting, investigating, and responding to identity and access threats. Our customers protect their critical IAM solutions and cloud environments from account takeover, insider threats, and privilege escalations.
ArmorPoint
A Full Managed Ecosystem of Cybersecurity ToolsArmorPoint redefines the traditional approach to cybersecurity by combining network operations, security operations, and SIEM technology in one platform. Designed by cybersecurity experts and backed by 24/7/365 U.S.-based support, It's cloud-hosted SIEM technology and extended detection and response capabilities enables businesses to implement a highly-effective, scalable cybersecurity program. With customizable pricing available, every ArmorPoint plan offers a dynamic level of managed security services that support the risk management initiatives of all companies, regardless of available budget, talent, or time. ArmorPoint is developed and powered by Trapp Technology, a Phoenix-based IT managed services provider.
Blumira
All-in-One Cloud SIEM + XDRBlumira makes security easy and effective for SMBs and mid-market companies, helping them detect and respond to cybersecurity threats faster to stop breaches and ransomware. Meet compliance, save time on security tasks, and focus on real threats with Blumira.
Black Kite
Cyber Security Ratings Platform & Third Party Risk Management - TPRMBlack Kite pushes the limits on predictive insights, delivering the highest quality intelligence to help organizations make better risk decisions and improve the health and safety of the entire planet’s cyber ecosystem.
Snyk
Snyk combines the power of developer-first tooling with best-in-class security intelligence.Snyk is a developer security platform that enables application and cloud developers to secure their whole application — finding and fixing vulnerabilities from their first lines of code to their running cloud.
Invicti
Application Security SaaS SolutionsInvisti is delivering the most accurate and efficient DAST solution for DevOps/DevSecOps teams to discover and secure all the applications that run their organizations.
LogRhythm
From detection through response, our SIEM was built for speed. Go faster with LogRhythm.LogRhythm uses machine learning and other techniques to surface advanced threats that might otherwise go unnoticed.
LogRhythm is the only SIEM designed to support the end-to-end threat detection and response workflow—what we call Threat Lifecycle Management™. Realize streamlined operations and lower total cost of ownership with our unified platform.
LogPoint
Streamlined Cyber Security Operations, Converged on One Platform.SIEM, SOAR, UEBA and Endpoint Security are converged for a precise, consistent, and efficient threat response.
Logpoint leverages advanced analytics, accelerated by Machine Learning to improve our customers’ cybersecurity and automate their digital transformation. Logpoint’s security analytics engine allows users to easily identify attacks, immediately respond and effectively report. With Logpoint, customers get a force multiplier for their security analysts to enhance the safety of critical business intelligence.
Blue Voyant
BlueVoyant leverages the best technology, talent, and telemetry in the industryFounded in 2017 with a mission to solve some of the most pressing cybersecurity challenges facing companies and government entities, BlueVoyant was born from years of experience building cyber defense capabilities for some of the most critical and hardened organizations in the world.
Headquartered in New York City with offices in Budapest, London, College Park (Maryland), Toronto, Tel Aviv, Bogota, Manila, and Singapore; the company has grown to more than 650 employees spanning five continents
BlueVoyant has won the Security MSSP (Managed Security Service Provider) of the Year award in the Microsoft Security Excellence Awards 2023.
Acunetix
Acunetix is the top vulnerability scanner for your web applicationsAcunetix by Invicti Security is an application security testing tool built to help small & mid-size organizations around the world take control of their web security.We believe in empowering security teams to reduce risk across all types of web applications with fast scanning, comprehensive results and intelligent automation.We know the proper tools can bridge the gap between security and development to reduce tension, finger pointing, and re-work to create a culture of security.
Headquartered in Austin Texas, Invicti was founded in 2018 by bringing together Netsparker and Acunetix, two brands that prevent costly data breaches and other security incidents by identifying web vulnerabilities from the early stages of application development through production.
Apptega
Governance Risk and Compliance (GRC) PlatformAs cyber-threats and regulatory mandates continue to expand, organizations are challenged by the difficulties of implementing effective cybersecurity and compliance programs. With Apptega, organizations of all sizes, including Fortune 500 enterprises and Managed Security Service Providers (MSSPs), are simplifying cybersecurity and compliance management.
Apptega is at the intersection of simple user experiences and patent-pending technology, providing an innovative platform paired with industry frameworks to build, manage and report great cybersecurity.
Panorays
Third-Party Risk Management - TPRM SoftwarePanorays is dedicated to eliminating third-party security risk so that companies worldwide can quickly and securely do business together.
We automate, accelerate and scale customers’ vendor security evaluation and risk management process.
Safe Security
Cyber Risk Quantification - CRQ SoftwareSafe Security is a global leader in cybersecurity and digital business risk quantification. With SAFE, we are managing cyber risk posture of Fortune 500 companies. Explore our journey since our inception in 2012.
Our mission is to become the de-facto industry standard to measure, manage, and transfer cyber risk.
Cyber security has always been measured in subjective siloes. With the growing sophistication of cyber attacks, cybersecurity through generic red-amber-green heat maps is not enough. We are at the epicenter of solving this problem through our enterprise-wide, objective, unified and real-time cyber risk quantification platform called SAFE.
Cyware
Turn Threat Intelligence Into Intelligent ActionCyber Fusion is purpose-built as an integrated platform, which includes award-winning TIP and SOAR products. Start with any solution or assemble a combination of solutions tailored to your needs.
Stay ahead of threats with our cyber fusion solutions for threat intelligence sharing and analysis, threat response, and security automation.
ThreatConnect
Cyber Risk Quantification - CRQ SoftwareThreatConnect enables threat intelligence operations, security operations, and cyber risk management teams to work together for more effective, efficient, and collaborative cyber defense and protection. With ThreatConnect, organizations infuse ML and AI-powered threat intel and cyber risk quantification into their work, allowing them to orchestrate and automate processes to get the necessary insights and respond faster and more confidently than ever before.
Axio
Cyber Risk Quantification - CRQ SoftwareAxio is the leader in SaaS-based cyber management software, which empowers security leaders to build and optimize security programs and quantify risk in financial terms. Axio360 is the only cyber risk management platform to align security leaders, business leaders, and Boards of Directors around a single source of truth about their most critical corporate risks. Since 2016, Axio has been a trusted partner to many of the world’s leading critical infrastructure, energy, manufacturing, and financial services companies, helping drive better visibility and decision-making about cybersecurity priorities and investments
Axio focuses on key areas of your enterprise that represent the highest risk so you can budget wisely, improve cyber resilience, and demonstrate duty of care. The Axio360 platform is a decision-making engine for holistic cyber risk management, including cybersecurity assessments, cyber risk quantification (CRQ), risk transfer, and cyber insurance analysis.
Splunk
Security Information & Event Management - SIEM, Security Orchestration, Automation, and Response -SOARSplunk - Security Information & Event Management (SIEM)
CyberClan
Digital Forensics and Incident Response Retainer Services - DFIR Service - Incident Response - IR ServicesCyberClan provides Digital Forensics and Incident Response Retainer Services, DFIR Services, and Incident Response - IR Services.
Cisco
Cisco Security Platform - Amp, Duo, Umbrella, Network Security, User and Endpoint Security, Cloud Edge, Firewalls and moreCisco Secure provides seamless interoperability with third-party technologies through a broad portfolio of technologies that work together. As a result, visibility is unified, automation is automated, and defenses are strengthened. Using the Cisco SecureX platform, the products listed below enable a secure network, endpoints, cloud edge, and applications.
Onspring
Governance, Risk and Compliance Software Platform - GRC SoftwareOnspring is a Governance, Risk and Compliance Software Platform (GRC) that helps your business manage risk.
RiskLens
Cyber Risk Quantification - CRQ SoftwareRiskLens is a Cyber Security Risk Quantification - CRQ Software Vendor.
RiskLens offers quantitative cyber risk management solutions built on the FAIR™ standard.
Cyberint
Threat Intelligence - Dark Web Monitoring - Attack Surface Management - ASMQualys
Vulnerability Management Detection and Response - VMDRQualys is best known for their Vulnerability Management Detection and Response - VMDR software.
BreachAware
Dark Web MonitoringIn order to prevent cyber crime and manage risks, BreachAware® software provides organizations across the world with advanced analysis of compromised assets within data breaches through their dark web monitoring software.
Rotate
Cyber Security Insurance Compliance PlatformHelp manage your Cyber Security Insurance policy with Rotate. Rotate is a Cyber Security Insurance Compliance Software Platform.
BlackCloak
Digital Executive Protection Platform - Protect Corporate Executive and High-Profile Individuals from cybersecurity, privacy, financial, and other reputational risks.BlackCloak is the cyber security industry's first Digital Executive Protection platform for Executives and High-Profile Individuals.
TechSlayers
Digital Executive Protection Services, Penetration Testing, PenTest Services, Automated PenTestingTechSlayers provides Digital Executive Protection Services, Penetration Testing, PenTest Services, and Automated PenTesting services.
GROUP-IB
Digital Forensics and Incident Response Retainer Services - DFIR Service - Incident Response - IR ServicesGROUP-IB provides Digital Forensics and Incident Response Retainer Services, DFIR Services, and Incident Response - IR Services.
mSOC.io
SOC-as-a-Service, Threat Hunting, Incident Response - IR Services, Digital Forensics and Incident Response ServicesmSOC.io is best known for providing SOC-as-a-Service, Threat Hunting, Incident Response - IR Services, Digital Forensics and Incident Response Services - DFIR Services.
Logsign
SIEM - Security Information and Event Management, SOAR - Security Orchestration, Automation and Response and Log ManagementWith Logsign, organizations can increase their cyber resilience by reducing risks and chaos as well as ensuring compliance with relevant regulations by integrating all data, threat detection, investigation, and incident response capabilities on a single, unified platform. The Logsign Unified SO Platform is a comprehensive security tool that creates a data lake, investigates vulnerabilities, analyzes risks, and automatically responds to threats.
X-Analytics
Cyber Risk Quantification - CRQ, Risk Management Solution, SEC Cyber Disclosure Tool, Cyber Security Insurance ToolBy integrating enterprise cybersecurity strategy with risk management strategy, X-Analytics informs strategic decision-making through cyber risk analytics. By using X-Analytics®, organizations can better understand and manage cyber risks.
Cymulate
Breach and Attack Simulation - BAS Software, Attack Surface Management - ASM and Continuous PenTestingCymulate was founded by an elite team of former IDF intelligence officers and leading cyber researchers who have dedicated their careers to empowering organizations worldwide against threats and making advanced cybersecurity as simple and familiar as sending an e-mail. Today, Cymulate is trusted by hundreds of companies worldwide, including leading healthcare and financial services.
Hive Pro
Threat Exposure Management - TEM, Asset Vulnerability Management, Vulnerability Management Aggregator, Threat Intelligence AggregatorContinuous Threat Exposure Management Solution Hive Pro is a recognized and trusted vendor in Threat Exposure Management, delivering a purpose-built platform to identify, manage, and resolve vulnerabilities and threats across your entire digital landscape. Only Hive Pro can give Security, IT, Business and DevOps teams the full spectrum of their cyber threat exposure and the means to actionably reduce it from one platform and one interface. Uni5 Xposure delivers a unified view of your cyber risks and all actionable pathways to resolve vulnerabilities and neutralize threats. By combining the power of infrastructure scanners, vulnerability assessment, risk prioritization, security control validation and remediation, Uni5 Xposure fortifies your cyber resiliency and preparedness.
Rubrik
Data Security - Backup and Recovery, Data Security Posture Management - DSPM, Data Loss Prevention - Backup as a Service IT Resilience OrchestrationProviding data security and operational resilience for enterprises, Rubrik is the Zero Trust Data Security Company. Using Rubrik's platform, you can provide data security and data protection on a single platform, including: Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery, and orchestrated application recovery. As a result, data is available at all times, allowing you to recover data and avoid paying a ransom. By securing your data, you secure your applications, and you secure your business.
IBM Security
Enterprise Cyber Security Solutions: SIEM, SOAR, EDR, Insider Threat, Identity Access Management - IAM, Attack Surface Management - ASMWith IBM Security®, you will benefit from advanced and integrated enterprise cybersecurity solutions and services infused with artificial intelligence. CYBER BUYER is an authorized IBM Security Reseller.
HackerOne
Penetration Test, PenTest and Bug BountyHackerOne makes the internet a safer place. Organizations can access the world's largest community of hackers through HackerOne, the trusted hacker-powered security platform. Using the most comprehensive database of vulnerability trends and industry benchmarks, the hacker community mitigates cyber risk by searching, finding, and safely reporting real-world security weaknesses across industries and attack surfaces. Among our customers are the U.S. Department of Defense, Dropbox, General Motors, GitHub, Goldman Sachs, Google, Hyatt, Lufthansa, Microsoft, MINDEF Singapore, Nintendo, PayPal, Qualcomm, Slack, Starbucks, Twitter, and Verizon Media.
Vicarius
Autonomous Vulnerability Remediation Platform, Vulnerability Management, Patch Management and Network ScanningVicarius develops an autonomous vulnerability remediation platform to help security teams protect their assets against software exploitation. Consolidating vulnerability assessment, prioritization, and remediation, Vicarius strengthens cyber hygiene and proactively reduces risk.
Truyo
A.I. Governance, A.I. Privacy, Compliance and Governance, A.I. Assessment and A.I. WorkshopsTruyo, an IntraEdge company - provides an all-in-one platform to manage privacy compliance and AI governance. The Truyo AI governance platform will help you locate shadow AI usage in your organization, monitor and remediate identified risks, perform risk assessments, and train your workforce on ethical & compliant AI usage. The privacy platform enables your end-users to exercise their data privacy rights without overburdening your workforce or your budgets. Truyo gives you true SARs, consent, and data privacy rights management automation right-sized for your organization. All while helping to keep you current with the latest requirements in privacy rights regulations through our highly scalable, non-disruptive solution. In our uncertain environment, Truyo gives you the confidence of superior performance today, while helping to future proof your investment for tomorrow.
Valence Security
SaaS Security - SaaS Security Posture Management - SSPMValence is the first SaaS security company to combine SSPM and advanced remediation with business user collaboration to find and fix SaaS security risks. SaaS applications are becoming decentrally managed and more complex, which is introducing misconfiguration, identity, data, and SaaS-to-SaaS integration risks. The Valence SaaS Security Platform provides visibility and remediation capabilities for business-critical SaaS applications such as Microsoft 365, Google Workspace, Salesforce, GitHub and Slack. With Valence, security teams can empower their business to securely adopt SaaS. Valence is backed by leading cybersecurity investors like Microsoft’s M12 and YL Ventures, and is trusted by leading organizations.
Todyl
MXDR - Managed eXtended Detection and Response, SASE - Secure Access Service Edge, SIEM - Security Information and Event Management, SOAR - Security Orchestration, Automation & Response, EDR - Endpoint Detection and Response, GRC - Governance Risk and ComTodyl is a Managed eXtended Detection and Response (MXDR) security platform who provides a full suite of managed security products and services.
Miggo
Application Detection and Response, App Detection and Response, AppSec, App Security, Application SecurityMiggo is a platform for Application Detection and Response (ADR). The application layer accounts for 80% of all cyber incidents, yet existing tools are blind to the actual behavior of applications. With Miggo, you can map how applications actually operate in runtime, identify high-risk application flows, find weak spots, and provide real-time detection and response capabilities.
HiddenLayer
A.I. Detection and Response, A.I. Application Security, A.I. Security, AI Security, Artificial Intelligence Security, AISEC Platform, A.I. Model ScannerHiddenLayer is a Gartner-recognized AI Application Security company that provides security solutions for artificial intelligence algorithms, models and data. HiddenLayer helps protect the world's most valuable technologies by developing first-of-its-kind, non-invasive software to observe and secure AI. HiddenLayer was founded in Austin, Texas, in March of 2022 by experienced professionals in security and artificial intelligence.
Senteon
CIS Controls Compliance, CIS Compliance Automation, Continuous Compliance Platform, Gap Assessment Tool for Compliance that comes with Remediation via CIS, Automated Remediation of CIS Controls and Compliance, Compliance & Frameworks, CIS Controls CompliaSenteon automates the deployment of 400+ security configurations, resulting in unmatched operational efficiency, accuracy, and cost savings. With cybersecurity insurance, it is essential to prove adherence to policy guidelines. With Senteon, you get more than just hardening - you get validation as well. We provide insurers with the empirical evidence they require, streamlining your approval process. Beyond compliance, Senteon aims for mastery with its Cross-Compliance Mapping. In addition to NIST 800-53, NIST 800-171, NIST CSF, FFIEC-CAT, PCI-DSS, SOC2, and CMMC, we adhere to global standards.
Reco ai
SaaS Security, SaaS Security Posture Management - SSPM, Shadow SaaS DiscoveryReco AI offers comprehensive SaaS security solutions. In addition to helping organizations discover SaaS applications, identities, and data, it also allows them to control access and prevent risks associated with exposure. Reco uses advanced analytics around personas, actions, interactions, and relationships, and alerts on exposures caused by misconfigurations, over-permission users, compromised accounts, and risky user behavior. A security team's insight allows them to mitigate risk quickly. In addition to the company's leadership team, the company's cybersecurity and counterintelligence teams bring expertise and innovation. Top-tier investors such as Insight Partners, Zeev Ventures, BoldStart Ventures, and Angular Ventures have backed Reco, which has established partnerships with Wiz, Palo Alto Networks, and Torq.
AccuKnox
Zero Trust CNAPP, Cloud Native Application Protection Platform - CNAPP, Cloud Security Posture Management - CSPM, Kubernetes Security, Container Security, Runtime SecurityWith AccuKnox's CNAPP platform, you can protect your cloud native applications without sharing your sensitive data. Founded in partnership with Stanford Research Institute (www.sri.com), AccuKnox is a pioneer in container security, anomaly detection, and data provenance. AccuKnox can be deployed in both public and private cloud environments. Seed funding for AccuKnox has been provided by SRI, National Grid Ventures, z5Capital, and Outliers.vc.
Gutsy
Governance Risk and Compliance SaaS Platform, GRC Process Automation PlatformBy leveraging Gutsy's data-driven security governance platform, security leaders can reduce risk, accelerate auditing, and drive accountability by understanding how security teams, tools, and services work together. With Gutsy, you can connect your existing tools, collect data from them, and automatically correlate it into processes, enabling security governance that consistently delivers better outcomes.
SeeMetrics
Cyber Security Performance Dashboard, Cyber Security Stack Management and CISO DashboardA simple interface integrates security data and business objectives with SeeMetrics automated cybersecurity performance management platform. The metrics provide precise and comprehensive insights based on data from the stack, enabling security leaders to make data-driven decisions, explain them quickly, and drill down to the details. They are fed directly from the stack. Cybersecurity Performance Dashboard, Cybersecurity Stack Management and CISO Dashboard.
OX Security
AppSec Posture Management - ASPM, Application Security, AppSec, Continuous CI/CD Security, Code Security, SBOM SecurityBy providing visibility and traceability, contextualized prioritization, and automated response throughout the software development lifecycle, OX Security's Active ASPM platform unifies AppSec practices and prevents risks. By eliminating manual practices and embracing scalable, secure development, the platform goes beyond traditional AppSec solutions.
Nametag Inc.
MFA Resets, Multi-Factor Authentication - MFA, Identity Access Management - IAM, Passwordless MFA and Help Desk Identity VerificationNametag is the only identity verification platform designed for self-service account recovery and helpdesk verification. Nametag works with your existing IAM and MFA infrastructure to quickly and securely verify your users during critical moments like password and MFA resets, employee onboarding, and high-risk transactions. Nametag's unique identity verification technology combines mobile cryptography, facial biometrics, and other advanced security technologies to shut down critical threat vectors, such as digital injections and deepfakes.
Optimize Cyber Security
Cyber Security Audit, Penetration Testing and Vulnerability AssessmentsThe Optimize Cyber team possesses deep knowledge of information security, technology, and risk management. Optimize Cyber uses this expertise to craft concise and practical solutions that help protect your business: The Rapid Security Audit™: Fortify your security program with a revolutionary approach that rapidly identifies your most critical cybersecurity risks. Make real progress in reducing cyber risk by focusing on the most impactful security priorities. - HIPAA Module: Supplemental to the Rapid Security Audit™, companies gain an understanding of how the organization measures against the privacy and governance requirements of HIPAA and a roadmap to improvement. - Financial Institution Module: Enhance your Financial Institution’s security and privacy program while better aligning with regulatory compliance. Proactive Security: Uncover weak points and see the impact of a cyber-attack, and how to best protect against them through vulnerability assessment and penetration testing.
SonicWall
Next-Generation Firewall - NGFW, Network Security, Secure SD-WAN, Zero Trust Network Access - ZTNA, Managed XDR, Managed Detection and Response - MDR, Endpoint Detection and Response - EDR, Email Security, Virtual Private Network - VPNSafeBreach
Breach and Attack Simulation - BAS, BAS, Continuous Threat Exposure Management - CTEM, CTEM, Ransomware AssessmentA leader in breach-and-attack simulation (BAS) and the most widely used platform for continuous security validation, SafeBreach combines the mindset of a CISO with the toolset of a hacker. SafeBreach continuously executes attacks, correlates results to highlight security gaps, and utilizes contextual insights to highlight remediation efforts. With their Hacker’s Playbook™, and arguably the industry’s most extensive collection of attack data enabled by state-of-the-art threat intelligence research, SafeBreach empowers organizations to get proactive about security with a simple approach that replaces hope with data.
Cyera
Data Security, Data Security Posture Management - DSPM, Data Detection and Response - DDR, Data Discovery and Classification, Data PrivacyCyera enables businesses to gain control over their most valuable asset: data. In addition to providing instant visibility into sensitive data, Cyera provides context on how it represents risks and their security exposure, as well as automated remediation, reducing the attack surface and ensuring operational resilience as a pioneer in Data Security Posture Management (DSPM). Cyear is redefining how data is protected.
Sentry Enterprises
Illuminated Cards, Passwordless Authentication, Physical Entry, Crypto Wallet, Self-Sovereign Identity, Physical Access, Yubico YubiKey AlternativeWe believe that in today’s highly transactional world, the concept of trust is misunderstood; and we’re out to redefine it. Sentry Enterprises is a manufacturer of converged biometric identification solutions that mitigate risk across our client’s enterprise.
SOCRadar
Dark Web Monitoring, Threat Intelligence, Attack Surface Management (ASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI)The SOCRadar SaaS platform combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI). Using SOCRadar, organizations can maximize the effectiveness of their SOC teams by providing free, actionable, and contextualized threat intelligence.
Prompt Security
A.I. Security, GenAI Security, A.I. Web Browser Security, A.I. Redaction, A.I. Code Security, A.I. DevOps SecurityBy deploying Prompt Security's Complete Platform for Generative AI Security, enterprises can benefit from the adoption of Generative AI while protecting their employees, customers, and applications. To prevent the exposure of sensitive data, block harmful content, and prevent GenAI-specific attacks, Prompt inspects prompts and model responses at every touchpoint of Generative AI in an organization — from AI tools used by employees to GenAI integrations in customer-facing products. Furthermore, enterprises can ensure that AI tools used within their organizations are transparent and governed. In an era of Generative AI, Prompt empowers organizations with the confidence they need to embrace A.I. technologies.
Chronosphere
SIEM Log Cost Reduction, SIEM, SIEM Efficiency, SIEM Log Management, Observability PlatformLooking to lower your SIEM Log Spend. Do you have SPLUNK and are tired of the increased costs?
Chronosphere is an observability platform designed for modern, containerized environments. Data complexity is reduced, costs are optimized, and issues can be remedied more quickly so our customers can focus on what matters - data and insights. By reducing data volumes and associated costs by 60%, Chronosphere's Observability Platform saves developers thousands of hours each year. With Fluent Bit-based Telemetry Pipeline, you can optimize and simplify data logging and observability. By transforming logs at the source, the product routes them to any destination without locking them in. Chronosphere is trusted by the world's most innovative brands, including Snap, Robinhood, DoorDash, and Zillow, which have been rated as leaders by major analyst firms.
Dazz
Application Security Posture Management - ASPM, Application Security - AppSec, Continuous Threat and Exposure Management - CTEM, DevSecOps, Vulnerability ManagementThe Dazz platform delivers unified security remediation for fast-moving security and development teams. Using developer-friendly workflows, we identify code flaws and infrastructure vulnerabilities, cut through the noise, prioritize issues, and deliver fixes to owners. Thus, Dazz customers can reduce exposure in hours instead of weeks by streamlining their remediation processes. This is why Dazz has become the industry standard for APM, CTEM, and DevSecOps practices.
Akeyless Security
Identity Access Management - IAM, Secrets Management, Unified Secrets & Machine Identity PlatformWith its Unified Secrets & Machine Identity Platform, Akeyless tackles the #1 cause of cybersecurity breaches - compromised identities and secrets. With Akeyless, Fortune 100 companies and industry leaders can protect their credentials, secrets, and machine identities across all environments with a cloud-native SaaS solution. Leading cybersecurity investors and financial institutions like JVP, Team8, and NGP Capital have backed Akeyless, which integrates Vaultless Secrets Management, Certificate Lifecycle Management, Secure Remote Access (Next Generation Privileged Access Management), and Encryption Key Management into a single cohesive platform. Through our unified approach, businesses can manage their secrets and machine identities securely in hybrid and multi-cloud environments while maintaining robust, scalable security. With Akeyless, companies can safeguard their most important assets against emerging threats as the only platform of its kind.